UK Teen Finally Arrested for DDoS Attack on ProtonMail Behalf of Russian Hackers Group

National Crime Agency (NCA) from the UK finally arrested the Teen for a heavy DDoS attack on ProtonMail email service.

19-year-old Teen George Duke-Cohan who was roaming on the internet under the name ‘7R1D3N7′, ‘DoubleParalla’ and ‘optcz1′, was launched a heavy DDoS attack on ProtonMail.

In this case, Protonmail faced a DDoS Attack on their network daily basis and five separate groups have been conducting this cyber attack.

George was one among the Russian cybercrime group “Apophis Squad” and he was involved in various cybercrime including several times for a number of DDoS attacks.

Also, he was responsible for making bomb threats to thousands of schools and a United Airlines flight traveling from the UK to San Francisco last month and he sent a mass email to schools in the UK and the US claiming that pipe bombs.

Also Read: Stop DDoS Attacks In 10 Seconds – Organization’s Most Important Consideration for DDOS Attack Mitigation

According to National Crime Agency, They investigators working with the FBI identified that whilst on pre-charge bail for the threats to schools, Duke-Cohan made bomb threats to the US-bound flight via phone calls to San Francisco Airport and their Bureau police.

 Apophis Squad cybercrime gang also claimed on their Twitter page that they are ultimately responsible for flight UAL 949 had been grounded.

In this case, ProtonMail started their investigation after the first attacks were launched, they found the attackers behind the Apophis Squad groups do not technically sound good and they found that some of the attackers in this group also ProtonMail users.

According to ProtonMail, Also George Duke-Cohan working with a number of hacking groups, On Aug. 31, officers from the British National Crime Agency (NCA) arrested Duke-Cohan outside of London.

“On Monday, he pleaded guilty in a UK court to three counts of making bomb threats to schools and airlines. We believe further charges are pending, along with possible extradition to the US.”

ProtonMail has been survived during the DDoS Attack due to the efforts of Radware, F5 Networks, and their own security team, they ware minimize the attack.

Protect website from future attacks Also Check your Companies DDOS Attack Downtime Cost.

So an organization should always ensure and focus on maximum Protection level for enterprise networks to Stop DDoS Attacks and you can try a free trial to Stop DDoS Attack in 10 Seconds.

Also Read

Stop DDoS Attacks In 10 Seconds – Organization’s Most Important Consideration for DDOS Attack Mitigation

DDoS Protection Bootcamp – Free Training Course to Improve Your DDoS Protection Skills

DDoS Attack Prevention Method on Your Enterprise’s Systems – A Detailed Report

Balaji

BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Recent Posts

Beware Of Weaponized Air Force invitation PDF Targeting Indian Defense And Energy Sectors

EclecticIQ cybersecurity researchers have uncovered a cyberespionage operation dubbed "Operation FlightNight" targeting Indian government entities and energy companies.  The attackers,…

1 hour ago

WarzoneRAT Returns Post FBI Seizure: Utilizing LNK & HTA File

The notorious WarzoneRAT malware has made a comeback, despite the FBI's recent efforts to dismantle its operations. Initially detected in…

1 hour ago

Google Revealed Kernel Address Sanitizer To Harden Android Firmware And Beyond

Android devices are popular among hackers due to the platform’s extensive acceptance and open-source nature. However, it has a big…

1 hour ago

Compromised SaaS Supply Chain Apps: 97% of Organizations at Risk of Cyber Attacks

Businesses increasingly rely on Software as a Service (SaaS) applications to drive efficiency, innovation, and growth. However, this shift towards…

2 hours ago

IT and security Leaders Feel Ill-Equipped to Handle Emerging Threats: New Survey

A comprehensive survey conducted by Keeper Security, in partnership with TrendCandy Research, has shed light on the growing concerns within…

5 hours ago

How to Analyse .NET Malware? – Reverse Engineering Snake Keylogger

Utilizing sandbox analysis for behavioral, network, and process examination provides a foundation for reverse engineering .NET malware.  The write-up outlines…

6 hours ago